아래의 사이트에서 Adrestore를 다운로드 받은 후 적합한 위치에 압축을 해제한다.
그리고 실행하면 Tomestones에 있는 개체를 볼 수 있다.
http://technet.microsoft.com/en-us/sysinternals/bb963906.aspx
C:\>Adrestore
AdRestore v1.1
by Mark Russinovich
Sysinternals - www.sysinternals.com
Enumerating domain deleted objects:
cn: Brenda
DEL:1cbb7c7e-b789-45b8-b8a3-a382e288b143
distinguishedName: CN=Brenda\0ADEL:1cbb7c7e-b789-45b8-b8a3-a382e288b143,CN=Deleted Objects,DC=Nwtraders1,DC=msft
lastKnownParent: DC=Nwtraders1,DC=msft
cn: Brenda
DEL:3659b11e-a4fa-43ae-85ae-bc276dea9a7e
distinguishedName: CN=Brenda\0ADEL:3659b11e-a4fa-43ae-85ae-bc276dea9a7e,CN=Deleted Objects,DC=Nwtraders1,DC=msft
lastKnownParent: DC=Nwtraders1,DC=msft
cn: Brenda
DEL:a0fa9bb8-fada-4333-baca-0ab494d27b4e
distinguishedName: CN=Brenda\0ADEL:a0fa9bb8-fada-4333-baca-0ab494d27b4e,CN=Deleted Objects,DC=Nwtraders1,DC=msft
lastKnownParent: DC=Nwtraders1,DC=msft
cn: Brenda
DEL:b00eb72b-2995-4b7d-b6fa-5ef3cdafc657
distinguishedName: CN=Brenda\0ADEL:b00eb72b-2995-4b7d-b6fa-5ef3cdafc657,CN=Deleted Objects,DC=Nwtraders1,DC=msft
lastKnownParent: DC=Nwtraders1,DC=msft
cn: Brenda
DEL:b3705cea-46e7-43be-92be-883eec33695d
distinguishedName: CN=Brenda\0ADEL:b3705cea-46e7-43be-92be-883eec33695d,CN=Deleted Objects,DC=Nwtraders1,DC=msft
lastKnownParent: DC=Nwtraders1,DC=msft
cn: Brenda
DEL:d239a309-be3b-42b4-b809-4fdf4bb32fe9
distinguishedName: CN=Brenda\0ADEL:d239a309-be3b-42b4-b809-4fdf4bb32fe9,CN=Deleted Objects,DC=Nwtraders1,DC=msft
lastKnownParent: DC=Nwtraders1,DC=msft
Found 6 items matching search criteria.
c:\>Adrestore -r d239a309-be3b-42b4-b809-4fdf4bb32fe9
AdRestore v1.1
by Mark Russinovich
Sysinternals - www.sysinternals.com
Enumerating domain deleted objects:
cn: Brenda
DEL:d239a309-be3b-42b4-b809-4fdf4bb32fe9
distinguishedName: CN=Brenda\0ADEL:d239a309-be3b-42b4-b809-4fdf4bb32fe9,CN=Delet
ed Objects,DC=Nwtraders1,DC=msft
lastKnownParent: DC=Nwtraders1,DC=msft
Do you want to restore this object (y/n)? y
Restore succeeded.
Found 1 item matching search criteria.
Written by kwnagjin kim